International Journal of Computer Science Issues

Displaying 1-40 of 879 results

In Component-Based Software Development (CBSD) approach, the searching and retrieving of accurate reusable software components that are stored in large, distributed and heterogeneous-structured repositories is a tedious and time consuming process. This paper presents the design and implementation of ontology-based multi-agent software component retrieval system using semantic and structural formalism....

An area of substantial research is that of predicting product sales, such as books, video games and movie tickets. There are a number of prediction models that have been used to predict future sales however these models attempt to solve the problem by making assumptions. These models assume that independent...

Significant innovations in virtualization and distributed computing as well as improved access to high-speed Internet have induced interest in cloud computing. Contemporary exploration of all stages of service models clearly proves the immense significance of \"Security in cloud computing\", which being as obtuse as it is pertinent, demands attention. An...

Voice over IP (VoIP) is a communication technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, services integration, and systems extensibility. Nevertheless, the VoIP technology suffers from many hurdles such as...

Wireless Sensor Networks (WSNs) consist of sensor nodes which can be deployed for various operations such as agriculture and environmental sensing, wild life monitoring, health care, military surveillance, industrial control, home automation, security etc. Quality of Service (QoS) is an important issue in Wireless Sensor Networks (WSNs) and providing QoS...

Discrete Wavelet Transform (DWT) has advantages over Fast Fourier Transform (FFT) in analyzing signals containing sharp spikes. DWT processes data at different scales. If the people look at the signal with a large window, they would notice big features. Similarly, if they look at the signal with a small window,...

In this paper, the authors describe the design and development of a mobile service to make practical assessments of different topics of mathematics in order to improve the skills of students in high school education. This tool has the ability to create user accounts for participants, as well as storing...

A modern tool has been introduced in this paper to researchers by definition of new concepts and approaches in order to optimize performance of databases. Although this is not going to argue that optimization of concepts like a better accessibility is impossible by the available tools, the main purpose is...

Cloud computing plays a major role by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc. But the authors can rely on cloud computing only when these web services are really secure enough to use. In this...

Spectrum Sensing has an important role in Cognitive Radio Network (CRN). Different methodologies have been proposed in the literature for spectrum sensing. Energy detector method is more practical and less in complexity. This paper presents analysis of energy detection algorithm in different scenarios with different parameters to detect presence or...

The Web Services (WS) technology became the reference architecture during the last few years for the integration of heterogeneous systems. As it is now-a-days critical for business to make applications communicate over the internet. WS has take essential position for building and integrating e-business applications and to allow information system...

Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper, the authors are trying...

The business environment, as a whole, was changed. It became more dynamic and more complex. Most organizations across the world have realized that in this rapidly changed environment, there is a strong need to become globally competitive and more interactive with the customers. The survival guide to competitiveness is to...

In this paper, a new algorithm for the selection of MultiPoint Relays (MPR) in Optimized Link State Routing protocol (OLSR) is proposed. OLSR is a routing protocol which could reduce the overhead of control messages by selecting MPRs. So, the number of MPRs is a key for the performance of...

For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

Wireless Sensor Network (WSN) provides an effective real-time monitoring approach. A design and implementation of WSN is introduced in this paper, which is applied to concentration measurement of hazardous gas. A hardware platform solution with compatibility and scalability is proposed in the paper. The customized communication protocol and applications oriented...

With social networks like Facebook, twitter reaching to the common masses, these have become the best target for spammers. The newest way to mislead and fraud viewers is page spam. Viewers are deceived to click on links to spam their connections, redirect to a fraudulent business or spread wrong information...

In this paper, an exploratory study has been conducted to understand the various aspects of the network void problem. This paper provides insights into multiple research questions, which include how and why each void problem occurs. The authors have covered ten void problems (i.e., coverage voids or holes, routing voids...

Given pervasive games that maintain a virtual spatiotemporal model of the physical world, game designers must contend with space and time in the virtual and physical. Previous papers on pervasive games have partially contended with these representations, but an integrated conceptual model is lacking. Because they both make use of...

In this paper, the authors present an educational game developed in three dimensions using software for modeling and animation (blender). The thematic that this development encompasses aims at providing students of computer networks with a tool that helps them to have a more meaningful learning in the process that involves...

In this paper, the authors introduced the three node communication model with feedback for the first and second nodes assuming where every arrival makes homogeneous Poisson process one of the possible decisions by forwarding to the next node or to return back to nodes without taking service. Assuming such a...

While considering the virtual cloud environment and various terms associated with it resource provisioning and load balancing are the main areas where research work has been going on at vast pace. Here the authors will discuss the various things related to the cloud environment. Their paper is to compare the...

Cloud computing is a technology that provide on-demand services namely storage-as-a-service, platform-as-a-service etc. over the internet via cloud vendors from the market to the user. Cloud computing allows utilization of the services regardless of the installation and maintenance problems to the users. Storage of data on single local machine or...

With the various developments that are taking place in the field of technology especially in the communication domain, there are a plethora of malpractices that are being practiced to hinder the users` chores. Most of these practices can be observed in the email account of a user. Any internet user...

In order to support the FHMIPv6 protocol in an ad-hoc network, the authors introduced a series of changes in the source code, they modified the ability to recognize and process messages of the intermediate nodes during the registration process, so that messages were successfully transmitted from source to destination. The...

In this paper, the authors analyze and develops the integration of the PMIPv6 (Proxy Mobile IPv6) and MPLS (Multi-Protocol Label Switching) protocols in order to determine the impact at the time of handover in an IP micro mobility environment. The proposed integration suggests the establishment of abidirectional Label Switched Path...

In this paper, the authors present a novel patch antenna using circular split ring resonator for ultra-wideband applications. The radiating element of the proposed antenna is a Split-Ring Resonator (SRR). The geometrical parameters are optimized to reach the best electromagnetic properties, with a small size (30 mm

The Fourth Generation (4G) of mobile cellular system network is growing very fast and new services come-up, so intelligent way of visualization and managing the 4G network and service states are required. In this paper, Coded Orthogonal Frequency Division Multiplexing (COFDM) scheme using convolutional coding with different code rates and...

Routing is a critical issue in a Mobile Ad-hoc NETwork (MANET). The most famous MANET routing protocols are AODV, DSDV, DSR and AOMDV. Although the performance evaluation of these routing protocols have been extensively simulated, most of the researchers are focusing on the User Datagram Protocol (UDP) traffic type supposing...

Over the years extensive studies have been carried out to apply coherent optical methods in real time communications and multimedia transmission. This is especially true when a large amount of information needs to be processed. The transmitted data can be intercepted by non-authorized people; this explains why considerable effort is...

Correct architecture is the backbone of the successful software. To address the complexity of the growing software there are different architectural models that are designed to handle this problem. The most important thing is to differentiate software architecture from software design. As the web based applications are developed under tight...

Mobile Ad hoc NETworks (MANETs) have a self-organizing network architecture, where a set of mobile nodes with wireless network interfaces may form a temporary network without any infrastructure. The characteristic features of ad hoc networks are dynamic topology, lack of infrastructure, the compounds of variable capacity, etc., which are the...

A modern tool has been introduced in this paper to researchers by definition of new concepts and approaches in order to optimize performance of databases. Although this is not going to argue that optimization of concepts like a better accessibility is impossible by the available tools, the main purpose is...

Cloud computing plays a major role by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc. But the authors can rely on cloud computing only when these web services are really secure enough to use. In this...

Spectrum Sensing has an important role in Cognitive Radio Network (CRN). Different methodologies have been proposed in the literature for spectrum sensing. Energy detector method is more practical and less in complexity. This paper presents analysis of energy detection algorithm in different scenarios with different parameters to detect presence or...

The Web Services (WS) technology became the reference architecture during the last few years for the integration of heterogeneous systems. As it is now-a-days critical for business to make applications communicate over the internet. WS has take essential position for building and integrating e-business applications and to allow information system...

Security, an abstraction which creates a virtual boundary and gives the sense of separation between the asset and the threat. It provides a layer of protection to the asset by encapsulating it and just making visible the necessary details to the outside world. In this paper, the authors are trying...

The business environment, as a whole, was changed. It became more dynamic and more complex. Most organizations across the world have realized that in this rapidly changed environment, there is a strong need to become globally competitive and more interactive with the customers. The survival guide to competitiveness is to...

In this paper, a new algorithm for the selection of MultiPoint Relays (MPR) in Optimized Link State Routing protocol (OLSR) is proposed. OLSR is a routing protocol which could reduce the overhead of control messages by selecting MPRs. So, the number of MPRs is a key for the performance of...

For developing countries, wireless networks seem to be the available alternative for providing affordable telecommunications services. In Iraq, the main governmental wireless Internet service provider is SCIS Company. It adopts WiMAX and WiFi wireless networks. Considering Quality of Service (QoS) as an indicator of network performance, it is a challenge...

Classification is one of the most frequently studied problems in data mining and machine learning research areas. It consists of predicting the value of a class attribute based on the values of other attributes. There are different classifications models were proposed in Educational Data Mining (EDM) and it is used...

One of the most important aspects to consider in order to provide quality services in an ad hoc network is the security. In the integration FHAMIPv6/MPLS/DiffServ and congestion algorithms, the authors analyses QoS but do not consider the QoS safety. The security issue is essential for not degrade QoS. This...

Due to the increasing complexity of distributed systems, security testing is becoming increasingly critical in insuring reliability of such systems in relation to their security requirements. To challenge this issue, the authors rely in this paper on model based active testing. In this paper, they propose a framework to specify...

In this paper, the authors will see the use of big data and open data in education. Also how big amount of data can be used and extracted to something useful, helping the industry to raise their profits. This paper is a study on the use of big data in...

Due to collect and monitor exploration of natural location resources which was difficult to acquire the location without Global Position System (GPS) in the underwater. However, there are something research was used Inertial Navigation System (INS) to location, but the INS accuracy degrades over time that the issue will be...

In this paper, the authors propose an efficient learning method for the layered neural networks based on the selection of training data and input characteristics of an output layer unit. The multi-stage learning method proposes by the authors for the function approximation problems of classifying learning data in a phased...

In this paper, the authors present an educational game developed in three dimensions using software for modeling and animation (blender). The thematic that this development encompasses aims at providing students of computer networks with a tool that helps them to have a more meaningful learning in the process that involves...

In this paper, the authors introduced the three node communication model with feedback for the first and second nodes assuming where every arrival makes homogeneous Poisson process one of the possible decisions by forwarding to the next node or to return back to nodes without taking service. Assuming such a...

While considering the virtual cloud environment and various terms associated with it resource provisioning and load balancing are the main areas where research work has been going on at vast pace. Here the authors will discuss the various things related to the cloud environment. Their paper is to compare the...

Cloud computing is a technology that provide on-demand services namely storage-as-a-service, platform-as-a-service etc. over the internet via cloud vendors from the market to the user. Cloud computing allows utilization of the services regardless of the installation and maintenance problems to the users. Storage of data on single local machine or...

With the various developments that are taking place in the field of technology especially in the communication domain, there are a plethora of malpractices that are being practiced to hinder the users` chores. Most of these practices can be observed in the email account of a user. Any internet user...

The Small and Medium Enterprise (SMEs) has a strategic role that could have a significant contribution in improving the prosperity of the society. The government has tried to empower SMEs through forming a forum in which those SMEs stakeholders could communicate to grow their businesses for economic community development. Whether...

In the past few years cloud has become the buzzword in computing. But this wide acceptance and ease of use exposed the new IT based technology into a number of data integrity (correctness of data) and security issues. Integrity of user data in the cloud servers is one of the...

Today, operators use reconfiguration to improve the performance of connection oriented networks. In the authors' paper, they studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In their previous approach, the available resources of the network (wavelengths) are not considered as limited. In this paper, they...

Computer usage has come increasing with time. Now-a-days everybody needs to work with lots of programs at the same time and unfortunately this leads to slowing down the work. So software developers have to find a way how deal with workflows. At first, when the author chose this theme, the...

Problem signatures are patterns that reveal a glimpse of the computational strategy most likely to be suitable for a given problem. Such a pattern could be the preferred choice of the activation and output functions for a given problem in neural networks that implement transfer functions optimization. The authors refer...

In order to support the FHMIPv6 protocol in an ad-hoc network, the authors introduced a series of changes in the source code, they modified the ability to recognize and process messages of the intermediate nodes during the registration process, so that messages were successfully transmitted from source to destination. The...

Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems have been receiving a great attention as one of the solutions for achieving high speed, efficient, and high quality of service wireless communications. However, the main drawback of MIMO OFDM systems is high Peak to Average Power Ratio (PAPR)...

Feature selection is a problem of global combinatorial optimization in machine learning in which subsets of relevant features are selected to realize robust learning models. The implying of irrelevant and redundant features in the dataset can result in poor predictions and misclassification process. Thus, selecting relevant feature subsets can help...

The endpoint temperature and carbon content of Basic Oxygen Furnace (BOF) are the control of the BOF steelmaking process. There exists a complex relationship among them and each control variable. While the multiple linear model is limited to predict the endpoint temperature and carbon content through each control variable, and...

Images in their uncompressed form require large amount of storage capacity and uncompressed data needs large transmission bandwidth for the transmission. Image compression technique is used to reduce the storage requirement per image, while maintaining image quality. The proposed method investigates biometric image compression using Gaussian Pyramid Compression (GPC) in...

Quality of Service (QoS) multicast routing is essential for many network applications such as IPTV, Internet radio, multimedia broadcasting, and real-time telecommunication. Multicast routing involves transport of information from one single sender to multiple destinations. There are two requirements of multicast routing in many multimedia real time applications: one is...

Web proxy caching plays a significant part in improving Web performance by conversing web objects that are likely to be visited again in the proxy server close to the user. The random forest tree is an ensemble learning method for Web data classification. In this paper, the authors attempt to...

The rendezvous process is an essential process for establishing a communication link between two nodes in cognitive radio networks. A number of rendezvous protocols have been developed in the last few years. However, many protocols ignore one of the basic constraints of cognitive radio networks which are the impact of...

Wireless Sensor Network (WSN) provides an effective real-time monitoring approach. A design and implementation of WSN is introduced in this paper, which is applied to concentration measurement of hazardous gas. A hardware platform solution with compatibility and scalability is proposed in the paper. The customized communication protocol and applications oriented...

With social networks like Facebook, twitter reaching to the common masses, these have become the best target for spammers. The newest way to mislead and fraud viewers is page spam. Viewers are deceived to click on links to spam their connections, redirect to a fraudulent business or spread wrong information...

In this paper, an exploratory study has been conducted to understand the various aspects of the network void problem. This paper provides insights into multiple research questions, which include how and why each void problem occurs. The authors have covered ten void problems (i.e., coverage voids or holes, routing voids...

Computer technology has been experiencing a quite rapid development in which it, in turn, has also caused a change in human life style. One of technologies bringing an impact on such life style is in the use of computer technology embedded in mobile communication devices. Now-a-days, a new trend in...

Cloud computing is a technology, which provides low cost, scalable computation capacity and a stack of services to enterprises on demand for expansion. The complications caused by data security and privacy are the main hindrances in its acceptance. Threats in cloud computing can be faced by adopting various security measures....

Researches in the development of efficient security models, policies and standards for the Android platform has increased significantly in recent times. Android suffers from the widespread security threats and malware due to the lack of efficient security tools for protection. However, recent studies on android mobile platform security stressed that...

Stochastic deployments of mobile Wireless Sensor Networks (WSNs) are practical in harsh fields, disaster areas, toxic urban regions or hostile environments where human reachability or intervention is impossible, and WSN deployment cannot be performed manually. These deployments may not always lead to effective coverage or; result in a connected network....

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?